theluemmel Profile Banner
LuemmelSec Profile
LuemmelSec

@theluemmel

Followers
8K
Following
7K
Media
299
Statuses
4K

I speak BloodHound. Husband, Father, IT-Guy, Security-Noob Blog: https://t.co/PXB35KEqs6 GitHub: https://t.co/Unp9jZOpBn

Somewhere in your AD
Joined June 2019
Don't wanna be here? Send us removal request.
@theluemmel
LuemmelSec
2 years
I can finally release my work on Amazon Cognito Ratelimit Bypassing as the fix is now globally deployed. Huge shoutout to James Kettle who discovered this attack vector and made the info public. Let me know what you think in the comments.
Tweet media one
4
22
102
@theluemmel
LuemmelSec
4 hours
RT @HackingLZ: This might be useful for enumerating the SaaS products companies use, but it was more of an exercise in seeing how many DNS….
Tweet card summary image
github.com
Contribute to HackingLZ/saas_enum development by creating an account on GitHub.
0
14
0
@theluemmel
LuemmelSec
11 hours
RT @stephenfewer: We now have a (draft) @metasploit exploit module in the pull queue for the recent Microsoft SharePoint Server unauthentic….
0
113
0
@theluemmel
LuemmelSec
11 hours
RT @leak_ix: As promised, our #SharePoint adventure with CVE-2025-53770 and CVE-2025-53771, including payloads and vulnerability checker!….
Tweet card summary image
blog.leakix.net
Exploring our adventure while building detection for SharePoint exploitation and vulnerability.
0
59
0
@theluemmel
LuemmelSec
14 hours
Had an environment that after blocking access to toolpane.aspx, still works. While rotating keys broke the app. Maybe a viable option to block it in front of your SP or even do it via IIS Rewrite rules. Maybe interesting for <=SP2013 users to go online without a patch.
0
0
3
@theluemmel
LuemmelSec
21 hours
Update on the SharePoint saga:. First samples seen bypassing AMSI (. Fist samples seen completely operating fileless, still extracting your machine keys. Please do not rely on AMSI nor that files need to be dropped first before shit happens.
Tweet card summary image
linkedin.com
🚨 Chinese hackers are actively exploiting new SharePoint flaws to bypass auth & run code remotely. Even Microsoft’s AMSI fix isn’t stopping them. The worst part? Many orgs aren’t patching. Details...
0
2
14
@theluemmel
LuemmelSec
23 hours
RT @Octoberfest73: My take on one of the new FileFix (DropFix?) MOTW bypasses. Awesome to collab with @mrd0x, exciting to see how TTPs can….
0
34
0
@theluemmel
LuemmelSec
23 hours
RT @leak_ix: Just a heads-up, attackers found a way to leak information, including keys entirely from memory. Checking for "the file" is no….
0
53
0
@theluemmel
LuemmelSec
2 days
Added ToolChain check. Reliably works for 2016, partly works for 2019 and Subscription as sometimes only Revision numbers change. Anyways, it is still a first indicator if you see a patch status of January 2025. Added batch support and range support.
Tweet media one
0
5
41
@theluemmel
LuemmelSec
2 days
Why the fuck was / is MS not mentioning to protect the ToolPane.aspx endpoint at all? Wouldn't that help? Is this breaking fundamental things in SP if it's not externally available?. I mean "people" will now patchdiff a lot. Maybe find bypasses and the shitshow starts all over.
0
0
2
@theluemmel
LuemmelSec
3 days
RT @_l0gg: My advice is temporary block ToolPane page. URL contain `ToolPane.aspx` and body contain `MSOTlPn_DWP` parameter. Remember to de….
0
7
0
@theluemmel
LuemmelSec
3 days
RT @BlinkzSec: Personally, I am convinced that you should use something like active defense in a company - maybe there is already another n….
0
7
0
@theluemmel
LuemmelSec
3 days
That is actually the real exploit. I went through all the decoding and stuff. It finally is the payload that creates spinstall0.aspx which then gets you the machine keys that allow you to craft your own Viewstates.
Tweet media one
@leak_ix
LeakIX
3 days
sharepoint.payload.txt.
Tweet media one
3
67
302
@theluemmel
LuemmelSec
3 days
RT @vxunderground: > whats the r word?. It rhymes with schmansome-schmare.
0
14
0
@theluemmel
LuemmelSec
3 days
RT @irsdl: 🚨.1- CVE-2025-53770 is a variant of CVE-2025-49704 - a critical auth bypass in SharePoint's ToolPane.aspx endpoint. It lets atta….
0
47
0
@theluemmel
LuemmelSec
3 days
RT @leak_ix: sharepoint.pwned.json.
Tweet media one
0
103
0
@theluemmel
LuemmelSec
3 days
RT @msftsecresponse: Microsoft has released security updates that fully protect customers using SharePoint Subscription Edition and SharePo….
0
46
0
@theluemmel
LuemmelSec
3 days
RT @leak_ix: sharepoint.payload.txt.
Tweet media one
0
90
0
@theluemmel
LuemmelSec
3 days
RT @CISACyber: Malicious actors are exploiting RCE vulnerability CVE-2025-53770 to compromise on-prem SharePoint servers. See our Alert for….
0
65
0
@theluemmel
LuemmelSec
3 days
RT @irsdl: Well it was possible to bypass the auth patch easily as even a slash after .aspx would jump the check but .
0
16
0